Skip to content Skip to sidebar Skip to footer
gpai guidelines ai act
AI Act GPAI Guidelines – What Every Business Must Know Before August 2025
The European Commission's GPAI guidelines under the AI Act are here—and they’re about to change how general-purpose AI models are developed, distributed, and regulated in the EU. If you work with large language models, generative AI systems, or provide AI tools to customers in the European Union, these guidelines define the rules you’ll need to follow from 2 August 2025.
italy extension micar crypto
Italy Extends Crypto VASP Regime: What the MiCAR Extension Really Means for the Market

Italy has officially extended its transitional regime for crypto operators registered as Virtual Asset Service Providers (VASPs), reshaping the timeline for implementing the Markets in Crypto-Assets Regulation (MiCAR). This MiCAR extension is more than a procedural delay — it reveals implicit tensions and strategic recalibrations in adapting to a radically new European regulatory framework for crypto.

artificial intelligence medical devices
How Artificial Intelligence is Revolutionizing Medical Devices Following the EU AI Act

Artificial intelligence is rapidly transforming the life sciences sector — and its impact on the medical devices industry is particularly significant, especially after the coming into force of the EU AI Act. From diagnostics to patient monitoring and personalized treatments, AI-powered medical technologies are reshaping the future of healthcare in Italy, Europe, and globally. But as innovation accelerates, so does the need for a robust legal framework — especially under the recently adopted AI Act.

ransomware crime italy
Ransomware and Crime – A Proposal to Tackle Cyber Extortion in Italy

The potential classification of activities associated with ransomware cyberattacks, including ransom payments by victims, as a crime has long been an unresolved issue, also in Italy. This concern has now led Italy to introduce a groundbreaking legislative proposal aimed at enhancing cybersecurity and mitigating threats posed by digital extortionists.